1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o

n a link to reset your password to the company’s website. You should proceed with caution because the email may be a(n) _______ attempt. A. spam B. phishing C. malware D. legitimate
Computers and Technology
2 answers:
tensa zangetsu [6.8K]3 years ago
7 0

the correct answer is : phishing

cestrela7 [59]3 years ago
3 0
Here are my definitions of each option:

Spam = Unwanted mail, advertisements, etc

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason

Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email

So based on this, I would say that the answer is B. Phishing


You might be interested in
Sam wants to move across the text and his documents to add data at predefined stops. Which key will Hughes to navigate through t
Setler [38]

Answer:

The TAB key

Explanation:

Sam would use the TAB key, located on the left side of the keyboard, to move around his document to add stops and format its information properly.

Pressing the TAB key will introduce a tab code in his document, which is like moving ahead by a certain number of spaces (5,6, 10 spaces for example, depending on the configuration of the document), but without using spaces, using a tab which is a much better option to position, align things up.

5 0
4 years ago
Digital Subscriber Line (DSL) is a way for traditional telephone companies to provide Internet access a way for traditional cabl
zvonat [6]

Answer:

Option A is correct

Digital Subscriber line is a way where telephone companies provide internet access for connection.

It is a communication medium used to transfer digital signals. DSL is one of the most popular broadband internet access.

Explanation:

DSL stands for Digital Subscriber Line. DSL works with high-speed bandwidth that connects from a phone jack to a telephone network. DSL works within frequencies. You can use the DSL while making phone calls.

6 0
3 years ago
Read 2 more answers
Why backup system of data and software is necessary. ​
zavuch27 [327]

Answer:

The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event, such as a malicious attack (virus or malware), or accidental deletion of data.

7 0
3 years ago
How to get administrator privileges on windows 7?
Phoenix [80]
If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
4 0
3 years ago
The Sussex Educational Processor executes an instruction every 3 clock cycles. Explain why that is the case and specifically wha
aniked [119]

Answer:

2b2t

Explanation:

2b2t

5 0
3 years ago
Other questions:
  • What connects two or more LANs together?
    10·2 answers
  • HELP I don't understand this
    14·2 answers
  • In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
    5·1 answer
  • Pls help will give brainlest​
    15·2 answers
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • 5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se
    14·1 answer
  • Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
    5·1 answer
  • What is the depth of the following tree?
    10·1 answer
  • Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in
    7·1 answer
  • Which of the following is an example of machine learning?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!